What is the purpose of systems software? - ANS Software designed to run or maintain a computer
Describe the functionality of systems software. - ANS It controls the operations of computer hardware
What is an operating system? - ANS A piece of software responsible for running the computer, managing
hardware, applications, users and resources
What are the 5 things that operating systems are used for? - ANS providing a UI, memory
management/multitasking, peripheral management and drivers, user management, file management
What is utility software? - ANS Software designed to help maintain a computer system
What is encryption software? - ANS Software used for encrypting data
What is defragmentation software? - ANS Reorganising data on a hard drive to put broken up files back
together and collect up the free space
What is data compression? - ANS The process of making the size of a file smaller
Give the 2 types of backup. - ANS full and incremental
What is Hacking? - ANS Illegal access or attack on a computer network or device
What is malware? - ANS Malicious software created to damage or gain illegal access to computer
systems
, What is Phishing? - ANS When criminals send emails or text to someone claiming to be a well-known
business.
Describe social engineering. - ANS A way of gaining illegal access to data or networks by influencing
people.
What is a Brute Force Attack? - ANS A network attack which uses software to crack security passwords
through trial and error.
What is a Denial of Service attack? - ANS A network attack which stops users from accessing a part of a
network or website.
What is data interception and theft? - ANS When data is intercepted when travelling across a network.
This can be done through packet sniffing or having a wireless connection.
What is SQL injection? - ANS A piece of SQL code which can be typed into an input box to try and attack
the SQL database
Give an example of a poor network policy. - ANS unencrypted data, no user access levels, no passwords,
no anti-malware or firewall software
What is penetration testing? - ANS The process of simulating attacks on a network to identify its
weaknesses
What does network forensics involve? - ANS monitoring the traffic on a network
What is a network policy? - ANS A set of rules and procedures an organisation will follow to ensure their
network is protected against attacks